Cybersecurity in Agile Cloud Computing--Cybersecurity Guidelines for Cloud Access
Cybersecurity in Agile Cloud Computing--Cybersecurity Guidelines for Cloud Access
| contributor author | IEEE - The Institute of Electrical and Electronics Engineers, Inc. | |
| date accessioned | 2023-08-07T18:46:20Z | |
| date available | 2023-08-07T18:46:20Z | |
| date copyright | 28 September 2022 | |
| date issued | 2022 | |
| identifier other | 9904636.pdf | |
| identifier uri | http://yse.yabesh.ir/std;query=autho162l-St79D40AC4261590-%20Naval%20Facilities%20E/handle/yse/329557 | |
| description abstract | Organizations demand immediate, uninterrupted access for their users, no matter where they are located. Digital business transformation efforts, adopting Software as a Service (SaaS), working from home (especially following the COVID-19 pandemic), and emerging edge computing platforms have changed how enterprises work. Digital business transformation requires anywhere, anytime access to applications and services--many of which are located in the cloud. The enterprise perimeter can now be everywhere--a dynamically created, policy-based secure access service edge. Enterprises want to protect their assets from unauthorized entities. Still, they also want to keep business continuity by allowing trusted devices and users to access applications hosted on-premises or in the cloud. To achieve this, one of the most critical security layers is secure remote access. This paper presents the cloud security guidelines and best practices, emphasizing secure remote access. | |
| language | English | |
| title | Cybersecurity in Agile Cloud Computing--Cybersecurity Guidelines for Cloud Access | en |
| title | Cybersecurity in Agile Cloud Computing--Cybersecurity Guidelines for Cloud Access | num |
| type | Standard | |
| page | 36 | |
| tree | IEEE - The Institute of Electrical and Electronics Engineers, Inc.:;2022 | |
| contenttype | Fulltext | |
| subject keywords | cloud computing | |
| subject keywords | Industry Connection | |
| subject keywords | cloud security | |
| subject keywords | cloud | |
| subject keywords | remote access | |
| subject keywords | cybersecurity | |
| author | David Tayouri|Snir Hassidim|Alex Smirnov|Asaf Shabtai |

درباره ما